Abstract

With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking, those applications have become an easy and attractive target for attackers who want to get access to mobile devices and obtain users’ sensitive information. Developing a secure application is very important; otherwise, attackers can easily exploit vulnerabilities in mobile applications which lead to serious security issues such as information leakage or injecting applications with malicious programs to access user data. In this paper, we survey the literature on application security on mobile devices, specifically mobile devices running on the Android platform, and exhibit security threats in the Android system. In addition, we study many reverse-engineering tools that are utilized to exploit vulnerabilities in applications. We demonstrate several reverse-engineering tools in terms of methodology, security holes that can be exploited, and how to use these tools to help in developing more secure applications.

Highlights

  • The development of information technology has been increasing dramatically which contributes to advancing the progress of society and the national economy. e Internet and its application have been an integral part of our life

  • In the way of information acquisition, the mobile devices represented by intelligent terminals are gradually replacing the traditional personal computers and are becoming a convenient channel for people to conduct network interconnection and obtain information anytime and anywhere [1]

  • In the mainstream intelligent devices operating system, the Android system developed by Google has become the world’s first share of the intelligent devices operating system in a few years with its open-source

Read more

Summary

Introduction

The development of information technology has been increasing dramatically which contributes to advancing the progress of society and the national economy. e Internet and its application have been an integral part of our life. Due to the increasing share of Android intelligent operating systems and its open-source, the information related to the system vulnerabilities and malware exposure is common, which led to various security problems that have caused substantial harm to Android users. With the Android system, users can store files, send and receive e-mail, surf the Internet, do mobile payment, and log in to various applications such as banks, government, or health facilities. Sensitive information such as account numbers, passwords, bank card information, personal photos, and other private information are stored in Android mobile devices, which make hackers attempt to gain that valuable information of users by taking advantage of the lack of security of the Android system [3]. E application coded by developers may have program vulnerabilities due to a lack of secure coding techniques

Mathematical Problems in Engineering
Memory Driver
Findings
XPath Injection

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.